[go: up one dir, main page]

Introducing G2.ai, the future of software buying.Try now

Best Dark Web Monitoring Tools

Lauren Worth
LW
Researched and written by Lauren Worth

Dark Web Monitoring tools are used to identify mentions of their organization on deep web and dark web forums and marketplaces, particularly any mentions which include compromised business data being illegally shared or sold. Deep web references areas on the internet that are non-indexed pages; dark web refers to non-indexed, illicit sites and private communications which are only accessible via Tor and I2P. This software uses automated scanners, web crawlers, and scraping techniques to continually monitor and analyze in real time any leaked sensitive business information, such as customer lists or data, employee login credentials, trade secrets, proprietary technology, and other valuable datasets made available on illicit markets. Businesses use dark web monitoring to reduce business risk, detect data breaches early, and to protect their intellectual property and brand reputation. Most commonly, dark web monitoring software is deployed and managed by a company's IT team or security team. Many of these tools have integrations with ticketing systems to assist with distributing real-time alerts to the right parties for remediation.

There is some overlap between dark web monitoring solutions and employee identity theft protection software and threat intelligence software. Employee identity theft protection software may monitor an individual employee's data on the dark web in addition to the surface web, but these tools are geared toward assisting an individual in the company, not a company's overall assets and brand. Threat intelligence software may also utilize some dark web monitoring functions, but has additional robust features to also identify novel cyber threats like new malware or active zero-day vulnerability exploits.

To qualify for inclusion in the Dark Web Monitoring tools category, a product must:

Provide automated monitoring of dark web forums and marketplaces for mentions of company name, employee data, customer data, and other selected keywords
Provide tools to analyze threats, including providing historical threat data, threat location data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations
Provide real-time alerts when compromised company or other selected information is detected on the dark web
Show More
Show Less

Featured Dark Web Monitoring Tools At A Glance

Cyberint, a Check Point Company
Sponsored
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
74 Listings in Dark Web Monitoring Available
(158)4.6 out of 5
6th Easiest To Use in Dark Web Monitoring software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

    Users
    • Threat Intelligence Analyst
    Industries
    • Financial Services
    • Computer & Network Security
    Market Segment
    • 71% Enterprise
    • 18% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Recorded Future is a threat intelligence platform that provides real-time, actionable threat intelligence, predictive analytics, and integrates with other security tools.
    • Reviewers like the platform's ability to provide a well-curated list of relevant threat actors, detailed TTPs, and proactive approach to threat hunting, making it a valuable tool for improving threat visibility and response.
    • Users mentioned that Recorded Future can be overwhelming due to its complex interface, high cost, steep learning curve, and the potential for alert fatigue if not carefully fine-tuned.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Recorded Future Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    67
    Features
    66
    Threat Detection
    48
    Threat Intelligence
    48
    Insights
    43
    Cons
    Expensive
    29
    Complexity
    26
    Learning Curve
    19
    Information Overload
    18
    Difficult Learning
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Recorded Future features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Analysis
    Average: 8.6
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
    8.8
    Monitoring - Dark Web
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Somerville, US
    Twitter
    @RecordedFuture
    108,837 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,104 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

Users
  • Threat Intelligence Analyst
Industries
  • Financial Services
  • Computer & Network Security
Market Segment
  • 71% Enterprise
  • 18% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Recorded Future is a threat intelligence platform that provides real-time, actionable threat intelligence, predictive analytics, and integrates with other security tools.
  • Reviewers like the platform's ability to provide a well-curated list of relevant threat actors, detailed TTPs, and proactive approach to threat hunting, making it a valuable tool for improving threat visibility and response.
  • Users mentioned that Recorded Future can be overwhelming due to its complex interface, high cost, steep learning curve, and the potential for alert fatigue if not carefully fine-tuned.
Recorded Future Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
67
Features
66
Threat Detection
48
Threat Intelligence
48
Insights
43
Cons
Expensive
29
Complexity
26
Learning Curve
19
Information Overload
18
Difficult Learning
17
Recorded Future features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.9
Analysis
Average: 8.6
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
8.8
Monitoring - Dark Web
Average: 9.0
Seller Details
Company Website
Year Founded
2009
HQ Location
Somerville, US
Twitter
@RecordedFuture
108,837 Twitter followers
LinkedIn® Page
www.linkedin.com
1,104 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyberint, otherwise known as Check Point External Risk Management, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The solution p

    Users
    • Security Threat Analyst
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 70% Enterprise
    • 21% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Cyberint is a proactive intelligence tool that provides an 'attacker's-eye view' of an organization, alerting to risks like credential leaks, phishing campaigns, and unauthorized brand usage.
    • Reviewers like the platform's ability to provide early warnings on critical risks, its efficient handling of malicious content removal, and the support provided by its team.
    • Users reported a significant learning period to unlock the platform's full potential, the overwhelming volume of raw data, and the need for more robust customization options for reporting.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyberint, a Check Point Company Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    58
    Threat Intelligence
    51
    Threat Detection
    41
    Customer Support
    38
    Insights
    37
    Cons
    Inefficient Alerts
    19
    Inefficient Alert System
    13
    False Positives
    12
    Integration Issues
    10
    Missing Features
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyberint, a Check Point Company features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Analysis
    Average: 8.6
    8.4
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
    9.2
    Monitoring - Dark Web
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,231 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,330 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Cyberint, otherwise known as Check Point External Risk Management, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The solution p

Users
  • Security Threat Analyst
Industries
  • Banking
  • Financial Services
Market Segment
  • 70% Enterprise
  • 21% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Cyberint is a proactive intelligence tool that provides an 'attacker's-eye view' of an organization, alerting to risks like credential leaks, phishing campaigns, and unauthorized brand usage.
  • Reviewers like the platform's ability to provide early warnings on critical risks, its efficient handling of malicious content removal, and the support provided by its team.
  • Users reported a significant learning period to unlock the platform's full potential, the overwhelming volume of raw data, and the need for more robust customization options for reporting.
Cyberint, a Check Point Company Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
58
Threat Intelligence
51
Threat Detection
41
Customer Support
38
Insights
37
Cons
Inefficient Alerts
19
Inefficient Alert System
13
False Positives
12
Integration Issues
10
Missing Features
9
Cyberint, a Check Point Company features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.1
Analysis
Average: 8.6
8.4
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
9.2
Monitoring - Dark Web
Average: 9.0
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,231 Twitter followers
LinkedIn® Page
www.linkedin.com
8,330 employees on LinkedIn®
Ownership
NASDAQ:CHKP

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(81)4.8 out of 5
1st Easiest To Use in Dark Web Monitoring software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

    Users
    • Security Analyst
    Industries
    • Financial Services
    • Airlines/Aviation
    Market Segment
    • 48% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudSEK Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    26
    Features
    24
    Customer Support
    22
    Monitoring
    17
    Implementation Ease
    16
    Cons
    False Positives
    13
    Dashboard Issues
    3
    Inefficient Alerts
    3
    Integration Issues
    3
    UX Improvement
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSEK features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Analysis
    Average: 8.6
    5.4
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
    9.5
    Monitoring - Dark Web
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudSEK
    Year Founded
    2015
    HQ Location
    Singapore, SG
    Twitter
    @cloudsek
    2,306 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    214 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

Users
  • Security Analyst
Industries
  • Financial Services
  • Airlines/Aviation
Market Segment
  • 48% Enterprise
  • 31% Mid-Market
CloudSEK Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
26
Features
24
Customer Support
22
Monitoring
17
Implementation Ease
16
Cons
False Positives
13
Dashboard Issues
3
Inefficient Alerts
3
Integration Issues
3
UX Improvement
3
CloudSEK features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
9.4
Analysis
Average: 8.6
5.4
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
9.5
Monitoring - Dark Web
Average: 9.0
Seller Details
Seller
CloudSEK
Year Founded
2015
HQ Location
Singapore, SG
Twitter
@cloudsek
2,306 Twitter followers
LinkedIn® Page
www.linkedin.com
214 employees on LinkedIn®
(1,897)4.4 out of 5
Optimized for quick response
8th Easiest To Use in Dark Web Monitoring software
Save to My Lists
Entry Level Price:$4.25
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LastPass is a secure, cloud-based password manager that takes the hassle out of remembering and managing passwords. It works across all your devices, so you can log in faster and stay protected everyw

    Users
    • Owner
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 64% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LastPass Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    292
    Password Management
    206
    Security
    188
    Autofill Feature
    137
    Easy Access
    130
    Cons
    Password Management
    132
    Autofill Issues
    108
    Login Issues
    85
    Password Issues
    60
    Browser Extension Issues
    44
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LastPass features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Analysis
    Average: 8.6
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
    8.9
    Monitoring - Dark Web
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LastPass
    Company Website
    Year Founded
    2008
    HQ Location
    Boston, Massachusetts
    Twitter
    @LastPass
    46,768 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    798 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LastPass is a secure, cloud-based password manager that takes the hassle out of remembering and managing passwords. It works across all your devices, so you can log in faster and stay protected everyw

Users
  • Owner
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 64% Small-Business
  • 25% Mid-Market
LastPass Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
292
Password Management
206
Security
188
Autofill Feature
137
Easy Access
130
Cons
Password Management
132
Autofill Issues
108
Login Issues
85
Password Issues
60
Browser Extension Issues
44
LastPass features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
8.6
Analysis
Average: 8.6
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
8.9
Monitoring - Dark Web
Average: 9.0
Seller Details
Seller
LastPass
Company Website
Year Founded
2008
HQ Location
Boston, Massachusetts
Twitter
@LastPass
46,768 Twitter followers
LinkedIn® Page
www.linkedin.com
798 employees on LinkedIn®
(1,133)4.6 out of 5
Optimized for quick response
9th Easiest To Use in Dark Web Monitoring software
Save to My Lists
100% Off
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper's intuitive cybersecurity platform is truste

    Users
    • IT Manager
    • Owner
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 44% Small-Business
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Keeper Password Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    220
    Security
    157
    Password Management
    125
    Secure Sharing
    119
    Sharing Ease
    96
    Cons
    Password Management
    97
    Autofill Issues
    63
    Login Issues
    46
    Learning Curve
    41
    Browser Extension Issues
    40
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keeper Password Manager features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Analysis
    Average: 8.6
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
    9.2
    Monitoring - Dark Web
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    Chicago, IL
    Twitter
    @keepersecurity
    18,998 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    570 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper's intuitive cybersecurity platform is truste

Users
  • IT Manager
  • Owner
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 44% Small-Business
  • 41% Mid-Market
Keeper Password Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
220
Security
157
Password Management
125
Secure Sharing
119
Sharing Ease
96
Cons
Password Management
97
Autofill Issues
63
Login Issues
46
Learning Curve
41
Browser Extension Issues
40
Keeper Password Manager features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
9.1
Analysis
Average: 8.6
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
9.2
Monitoring - Dark Web
Average: 9.0
Seller Details
Company Website
Year Founded
2011
HQ Location
Chicago, IL
Twitter
@keepersecurity
18,998 Twitter followers
LinkedIn® Page
www.linkedin.com
570 employees on LinkedIn®
16% Off: $14950 per year
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Since 2019, SOCRadar has been a pioneer in SaaS cybersecurity, now serving over 900 customers across 75 countries. Our mission is to provide accessible, proactive threat intelligence. Today, SOCRadar

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 42% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SOCRadar Extended Threat Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Insights
    17
    Threat Intelligence
    16
    Features
    15
    Ease of Use
    13
    Threat Detection
    13
    Cons
    Inefficient Alert System
    4
    Information Overload
    4
    Integration Issues
    4
    Limited Features
    4
    False Positives
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Analysis
    Average: 8.6
    4.9
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
    9.3
    Monitoring - Dark Web
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOCRadar
    Company Website
    Year Founded
    2018
    HQ Location
    Delaware
    Twitter
    @socradar
    5,412 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Since 2019, SOCRadar has been a pioneer in SaaS cybersecurity, now serving over 900 customers across 75 countries. Our mission is to provide accessible, proactive threat intelligence. Today, SOCRadar

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 42% Enterprise
  • 41% Mid-Market
SOCRadar Extended Threat Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Insights
17
Threat Intelligence
16
Features
15
Ease of Use
13
Threat Detection
13
Cons
Inefficient Alert System
4
Information Overload
4
Integration Issues
4
Limited Features
4
False Positives
3
SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.9
Analysis
Average: 8.6
4.9
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
9.3
Monitoring - Dark Web
Average: 9.0
Seller Details
Seller
SOCRadar
Company Website
Year Founded
2018
HQ Location
Delaware
Twitter
@socradar
5,412 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
(40)4.7 out of 5
Optimized for quick response
7th Easiest To Use in Dark Web Monitoring software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyble is an AI-native cybersecurity solution designed to help organizations enhance their digital security posture through real-time intelligence, detection, and response capabilities. By leveraging a

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyble Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Insights
    13
    Threat Detection
    13
    Monitoring
    12
    Threat Intelligence
    12
    Features
    11
    Cons
    Inefficient Alerts
    8
    False Positives
    7
    Inefficient Alert System
    6
    Limited Customization
    4
    Dashboard Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyble features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Analysis
    Average: 8.6
    9.2
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
    9.3
    Monitoring - Dark Web
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyble
    Company Website
    Year Founded
    2019
    HQ Location
    Alpharetta, US
    Twitter
    @cybleglobal
    17,281 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    240 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyble is an AI-native cybersecurity solution designed to help organizations enhance their digital security posture through real-time intelligence, detection, and response capabilities. By leveraging a

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Enterprise
  • 23% Mid-Market
Cyble Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Insights
13
Threat Detection
13
Monitoring
12
Threat Intelligence
12
Features
11
Cons
Inefficient Alerts
8
False Positives
7
Inefficient Alert System
6
Limited Customization
4
Dashboard Issues
3
Cyble features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.0
Analysis
Average: 8.6
9.2
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
9.3
Monitoring - Dark Web
Average: 9.0
Seller Details
Seller
Cyble
Company Website
Year Founded
2019
HQ Location
Alpharetta, US
Twitter
@cybleglobal
17,281 Twitter followers
LinkedIn® Page
www.linkedin.com
240 employees on LinkedIn®
(60)4.7 out of 5
4th Easiest To Use in Dark Web Monitoring software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

    Users
    No information available
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 43% Enterprise
    • 40% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • CTM360 is a digital risk protection and threat intelligence platform that offers services such as brand protection, anti-phishing, and takedowns.
    • Reviewers like the platform's user-friendly interface, comprehensive coverage, proactive monitoring, and the highly responsive and professional support team.
    • Reviewers experienced some difficulties with the platform's interface, finding it not user-friendly at times, and mentioned that the takedown process can sometimes be slow.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CTM360 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    25
    Ease of Use
    19
    Monitoring
    16
    Features
    15
    Detection
    12
    Cons
    Integration Issues
    5
    Lack of Integrations
    4
    Limited Customization
    3
    Limited Features
    3
    Slow Performance
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CTM360 features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.1
    Analysis
    Average: 8.6
    8.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
    8.7
    Monitoring - Dark Web
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CTM360
    Company Website
    Year Founded
    2014
    HQ Location
    Manama, Capital Governate
    Twitter
    @teamCTM360
    979 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    119 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

Users
No information available
Industries
  • Banking
  • Financial Services
Market Segment
  • 43% Enterprise
  • 40% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • CTM360 is a digital risk protection and threat intelligence platform that offers services such as brand protection, anti-phishing, and takedowns.
  • Reviewers like the platform's user-friendly interface, comprehensive coverage, proactive monitoring, and the highly responsive and professional support team.
  • Reviewers experienced some difficulties with the platform's interface, finding it not user-friendly at times, and mentioned that the takedown process can sometimes be slow.
CTM360 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
25
Ease of Use
19
Monitoring
16
Features
15
Detection
12
Cons
Integration Issues
5
Lack of Integrations
4
Limited Customization
3
Limited Features
3
Slow Performance
3
CTM360 features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
8.1
Analysis
Average: 8.6
8.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
8.7
Monitoring - Dark Web
Average: 9.0
Seller Details
Seller
CTM360
Company Website
Year Founded
2014
HQ Location
Manama, Capital Governate
Twitter
@teamCTM360
979 Twitter followers
LinkedIn® Page
www.linkedin.com
119 employees on LinkedIn®
(55)4.5 out of 5
Optimized for quick response
14th Easiest To Use in Dark Web Monitoring software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ZeroFox is the architect of the world’s first unified end-to-end external cybersecurity platform. We empower security teams to regain the advantage against emergent threats by providing unprecedented

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 44% Mid-Market
    • 35% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • ZeroFox is a threat intelligence platform that identifies and monitors digital threats across social media, web platforms, and dark web sources.
    • Users like the platform's real-time threat alerts, automated takedown capabilities, and its ability to provide visibility into threats across the public attack surface, especially on social media, the dark web, and external digital platforms.
    • Users experienced issues with the user interface, reporting that it could be more intuitive, and expressed dissatisfaction with the reporting and analytics features, which they found could be more customizable and detailed.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ZeroFox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    16
    Alert Notifications
    14
    Ease of Use
    13
    Alerts
    10
    Features
    10
    Cons
    Missing Features
    9
    Inadequate Reporting
    6
    Inefficiency
    4
    Integration Issues
    4
    Confusing Interface
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ZeroFox features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.0
    Analysis
    Average: 8.6
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
    8.6
    Monitoring - Dark Web
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ZeroFox
    Company Website
    Year Founded
    2013
    HQ Location
    Baltimore, MD
    Twitter
    @ZeroFOX
    5,271 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    853 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ZeroFox is the architect of the world’s first unified end-to-end external cybersecurity platform. We empower security teams to regain the advantage against emergent threats by providing unprecedented

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 44% Mid-Market
  • 35% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • ZeroFox is a threat intelligence platform that identifies and monitors digital threats across social media, web platforms, and dark web sources.
  • Users like the platform's real-time threat alerts, automated takedown capabilities, and its ability to provide visibility into threats across the public attack surface, especially on social media, the dark web, and external digital platforms.
  • Users experienced issues with the user interface, reporting that it could be more intuitive, and expressed dissatisfaction with the reporting and analytics features, which they found could be more customizable and detailed.
ZeroFox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
16
Alert Notifications
14
Ease of Use
13
Alerts
10
Features
10
Cons
Missing Features
9
Inadequate Reporting
6
Inefficiency
4
Integration Issues
4
Confusing Interface
3
ZeroFox features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.0
Analysis
Average: 8.6
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
8.6
Monitoring - Dark Web
Average: 9.0
Seller Details
Seller
ZeroFox
Company Website
Year Founded
2013
HQ Location
Baltimore, MD
Twitter
@ZeroFOX
5,271 Twitter followers
LinkedIn® Page
www.linkedin.com
853 employees on LinkedIn®
(1,513)4.6 out of 5
10th Easiest To Use in Dark Web Monitoring software
View top Consulting Services for 1Password
Save to My Lists
100% Off: 0
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

    Users
    • Software Engineer
    • CEO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 57% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • 1Password Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    139
    Security
    110
    Password Management
    54
    Intuitive
    50
    Secure Sharing
    45
    Cons
    Password Management
    55
    Authentication Issues
    27
    Expensive
    27
    Login Issues
    27
    Autofill Issues
    23
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 1Password features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Analysis
    Average: 8.6
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
    9.4
    Monitoring - Dark Web
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    1Password
    Year Founded
    2005
    HQ Location
    Ontario
    Twitter
    @1Password
    140,465 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,628 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Most Used Enterprise Password Manager, trusted by over 150,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secu

Users
  • Software Engineer
  • CEO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 57% Small-Business
  • 31% Mid-Market
1Password Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
139
Security
110
Password Management
54
Intuitive
50
Secure Sharing
45
Cons
Password Management
55
Authentication Issues
27
Expensive
27
Login Issues
27
Autofill Issues
23
1Password features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.1
Analysis
Average: 8.6
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
9.4
Monitoring - Dark Web
Average: 9.0
Seller Details
Seller
1Password
Year Founded
2005
HQ Location
Ontario
Twitter
@1Password
140,465 Twitter followers
LinkedIn® Page
www.linkedin.com
2,628 employees on LinkedIn®
(61)4.2 out of 5
Optimized for quick response
12th Easiest To Use in Dark Web Monitoring software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dark Web ID ensures the greatest amount of protection from risks posed by compromised credentials. It provides 24/7/365 human and machine-powered monitoring of business and personal credentials, inclu

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 64% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Dark Web ID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dark Web Monitoring
    11
    Ease of Use
    5
    Monitoring
    5
    Security
    5
    Alert Notifications
    4
    Cons
    Insufficient Information
    4
    Data Breach
    3
    Inefficient Alerts
    3
    Expensive
    2
    User Frustration
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dark Web ID features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.1
    Analysis
    Average: 8.6
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
    8.8
    Monitoring - Dark Web
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Company Website
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,548 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,638 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dark Web ID ensures the greatest amount of protection from risks posed by compromised credentials. It provides 24/7/365 human and machine-powered monitoring of business and personal credentials, inclu

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 64% Small-Business
  • 33% Mid-Market
Dark Web ID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dark Web Monitoring
11
Ease of Use
5
Monitoring
5
Security
5
Alert Notifications
4
Cons
Insufficient Information
4
Data Breach
3
Inefficient Alerts
3
Expensive
2
User Frustration
2
Dark Web ID features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.2
8.1
Analysis
Average: 8.6
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
8.8
Monitoring - Dark Web
Average: 9.0
Seller Details
Seller
Kaseya
Company Website
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,548 Twitter followers
LinkedIn® Page
www.linkedin.com
5,638 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Connect, collaborate, and remediate risk faster with timely and active intelligence. Gain visibility into intelligence landscapes across cyber threats, vulnerabilities, and physical security. With Ign

    Users
    No information available
    Industries
    • Financial Services
    • Security and Investigations
    Market Segment
    • 63% Enterprise
    • 22% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Flashpoint is a tool used for Vulnerability Management and Threat Intel, providing features such as collections, search functions, and source investigation.
    • Users frequently mention the ease of use, the helpful collections feature, the ability to see and investigate the source of information, and the AI summary capability that helps filter out noise.
    • Users mentioned issues such as the overwhelming navigation, the need for different search functions, the mismatch between alerting feature and alerting emails, constant platform changes disrupting workflows, and limitations in the bookmarking feature.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Flashpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    19
    Features
    18
    Helpful
    13
    Search Functionality
    12
    Insights
    11
    Cons
    Search Complexity
    6
    User Frustration
    6
    Complexity
    5
    Information Overload
    5
    Lack of Features
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Flashpoint features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Analysis
    Average: 8.6
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
    9.0
    Monitoring - Dark Web
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    New York, NY
    Twitter
    @FlashpointIntel
    14,065 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    390 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Connect, collaborate, and remediate risk faster with timely and active intelligence. Gain visibility into intelligence landscapes across cyber threats, vulnerabilities, and physical security. With Ign

Users
No information available
Industries
  • Financial Services
  • Security and Investigations
Market Segment
  • 63% Enterprise
  • 22% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Flashpoint is a tool used for Vulnerability Management and Threat Intel, providing features such as collections, search functions, and source investigation.
  • Users frequently mention the ease of use, the helpful collections feature, the ability to see and investigate the source of information, and the AI summary capability that helps filter out noise.
  • Users mentioned issues such as the overwhelming navigation, the need for different search functions, the mismatch between alerting feature and alerting emails, constant platform changes disrupting workflows, and limitations in the bookmarking feature.
Flashpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
19
Features
18
Helpful
13
Search Functionality
12
Insights
11
Cons
Search Complexity
6
User Frustration
6
Complexity
5
Information Overload
5
Lack of Features
5
Flashpoint features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.6
Analysis
Average: 8.6
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
9.0
Monitoring - Dark Web
Average: 9.0
Seller Details
Company Website
Year Founded
2010
HQ Location
New York, NY
Twitter
@FlashpointIntel
14,065 Twitter followers
LinkedIn® Page
www.linkedin.com
390 employees on LinkedIn®
(85)4.7 out of 5
11th Easiest To Use in Dark Web Monitoring software
View top Consulting Services for Guardz
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Guardz is the unified cybersecurity platform purpose-built for MSPs. We consolidate the essential security controls, including identities, endpoints, email, awareness, and more, into one AI-native fra

    Users
    • Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 75% Small-Business
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Guardz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    47
    Security
    39
    Features
    29
    Threat Detection
    27
    Easy Setup
    23
    Cons
    Limited Features
    9
    Needs Improvement
    7
    Integration Issues
    6
    Missing Features
    6
    UX Improvement
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Guardz features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Analysis
    Average: 8.6
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
    9.0
    Monitoring - Dark Web
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Guardz
    Company Website
    Year Founded
    2022
    HQ Location
    Tel Aviv, IL
    Twitter
    @GuardzCyber
    87 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    136 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Guardz is the unified cybersecurity platform purpose-built for MSPs. We consolidate the essential security controls, including identities, endpoints, email, awareness, and more, into one AI-native fra

Users
  • Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 75% Small-Business
  • 22% Mid-Market
Guardz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
47
Security
39
Features
29
Threat Detection
27
Easy Setup
23
Cons
Limited Features
9
Needs Improvement
7
Integration Issues
6
Missing Features
6
UX Improvement
6
Guardz features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.5
Analysis
Average: 8.6
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
9.0
Monitoring - Dark Web
Average: 9.0
Seller Details
Seller
Guardz
Company Website
Year Founded
2022
HQ Location
Tel Aviv, IL
Twitter
@GuardzCyber
87 Twitter followers
LinkedIn® Page
www.linkedin.com
136 employees on LinkedIn®
(288)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Dark Web Monitoring software
View top Consulting Services for usecure
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    secure is an automated Human Risk Management platform that helps MSPs and internal IT teams rapidly reduce employee cyber risk. Deploy adaptive security awareness training, run realistic phishing simu

    Users
    • Director
    • President
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 60% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • usecure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    62
    Training Efficiency
    38
    Training
    36
    Customer Support
    34
    Easy Setup
    34
    Cons
    Inadequate Reporting
    10
    Poor Reporting
    8
    Phishing Issues
    7
    Limited Customization
    6
    Limited Features
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • usecure features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Analysis
    Average: 8.6
    9.9
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
    8.3
    Monitoring - Dark Web
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    usecure
    Company Website
    Year Founded
    2016
    HQ Location
    Manchester,, GB
    Twitter
    @getusecure
    899 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    55 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

secure is an automated Human Risk Management platform that helps MSPs and internal IT teams rapidly reduce employee cyber risk. Deploy adaptive security awareness training, run realistic phishing simu

Users
  • Director
  • President
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 60% Small-Business
  • 35% Mid-Market
usecure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
62
Training Efficiency
38
Training
36
Customer Support
34
Easy Setup
34
Cons
Inadequate Reporting
10
Poor Reporting
8
Phishing Issues
7
Limited Customization
6
Limited Features
6
usecure features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
8.6
Analysis
Average: 8.6
9.9
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
8.3
Monitoring - Dark Web
Average: 9.0
Seller Details
Seller
usecure
Company Website
Year Founded
2016
HQ Location
Manchester,, GB
Twitter
@getusecure
899 Twitter followers
LinkedIn® Page
www.linkedin.com
55 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortra's PhishLabs is a cyber threat intelligence company that delivers Digital Risk Protection through curated threat intelligence and complete mitigation. PhishLabs provides brand impersonation, acc

    Users
    No information available
    Industries
    • Computer & Network Security
    • Computer Software
    Market Segment
    • 47% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Fortra Brand Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    6
    Alerts
    4
    Ease of Use
    3
    Response Time
    3
    Security
    3
    Cons
    Expensive
    2
    Outdated Interface
    1
    Pricing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortra Brand Protection features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Analysis
    Average: 8.6
    1.7
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
    8.8
    Monitoring - Dark Web
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Company Website
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,525 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,668 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fortra's PhishLabs is a cyber threat intelligence company that delivers Digital Risk Protection through curated threat intelligence and complete mitigation. PhishLabs provides brand impersonation, acc

Users
No information available
Industries
  • Computer & Network Security
  • Computer Software
Market Segment
  • 47% Mid-Market
  • 29% Small-Business
Fortra Brand Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
6
Alerts
4
Ease of Use
3
Response Time
3
Security
3
Cons
Expensive
2
Outdated Interface
1
Pricing Issues
1
Fortra Brand Protection features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.8
Analysis
Average: 8.6
1.7
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
8.8
Monitoring - Dark Web
Average: 9.0
Seller Details
Seller
Fortra
Company Website
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,525 Twitter followers
LinkedIn® Page
www.linkedin.com
1,668 employees on LinkedIn®